Cybersecurity

Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking

A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things

Adaptive Steganography and Steganalysis with Fixed-Size Embedding

We analyze a two-player zero-sum game between a steganographer, Alice, and a steganalyst, Eve. In this game, Alice wants to hide a secret message of length $k$ in a binary sequence, and Eve wants to detect whether a secret message is present. The …

Integrity Assurance in Resource-Bounded Systems through Stochastic Message Authentication

Network Topology Vulnerability/Cost Tradeoff: Model, Application, and Computational Complexity

Technological networks (e.g. telephone and sensor networks, Internet) have provided modern society with increased efficiency, but have also exposed us to the risks posed by their vulnerability to attacks. Mitigating these risks involves designing …

Optimal Personalized Filtering Against Spear-Phishing Attacks

When Bitcoin Mining Pools Run Dry: A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools

FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources

Secure Team Composition to Thwart Insider Threats and Cyberespionage

We develop a formal non-deterministic game model for secure team composition to counter cyber-espionage and to protect organizational secrets against an attacker who tries to sidestep technical security mechanisms by offering a bribe to a project …

A Survey of Interdependent Information Security Games

Risks faced by information system operators and users are not only determined by their own security posture, but are also heavily affected by the security-related decisions of others. This interdependence between information system operators and …